Outlier detection and countermeasure for hierarchical wireless sensor networks

被引:26
|
作者
Zhang, Y-Y [1 ]
Chao, H. -C. [2 ]
Chen, M. [3 ]
Shu, L. [4 ,6 ]
Park, C. -H. [5 ]
Park, M. -S. [5 ]
机构
[1] Shenyang Inst Engn, Dept Informat & Engn, Shenyang, Peoples R China
[2] Natl Ilan Univ, Coll Elect Engn & Comp Sci, Ilan, Taiwan
[3] Seoul Natl Univ, Seoul, South Korea
[4] Natl Univ Ireland, Digital Enterprise Res Inst, Galway, Ireland
[5] Korea Univ, Dept Comp Sci & Engn, Seoul 136701, South Korea
[6] Osaka Univ, Dept Multimedia Engn, Suita, Osaka 565, Japan
基金
爱尔兰科学基金会;
关键词
SECURITY; KEY;
D O I
10.1049/iet-ifs.2009.0192
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Outliers in wireless sensor networks (WSNs) are sensor nodes that issue attacks by abnormal behaviours and fake message dissemination. However, existing cryptographic techniques are hard to detect these inside attacks, which cause outlier recognition a critical and challenging issue for reliable and secure data dissemination in WSNs. To efficiently identify and isolate outliers, this study presents a novel outlier detection and countermeasure scheme (ODCS), which consists of three mechanisms: (i) abnormal event observation mechanism for network surveillance; (ii) exceptional message supervision mechanism for distinguishing fake messages by exploiting spatiotemporal correlation and consistency and (iii) abnormal behaviour supervision mechanism for the evaluation of node behaviour. The ODCS provides a heuristic methodology and does not need the knowledge about normal or malicious sensors in advance. This property makes the ODCS not only to distinguish and deal with various dynamic attacks automatically without advance learning, but also to reduce the requirement of capability for constrained nodes. In the ODCS, the communication is limited in a local range, such as one-hop or a cluster, which can reduce the communication frequency and circumscribe the session range further. Moreover, the ODCS provides countermeasures for different types of attacks, such as the rerouting scheme and the rekey security scheme, which can separate outliers from normal sensors and enhance the robustness of network, even when some nodes are compromised by adversary. Simulation results indicate that our approach can effectively detect and defend the outlier attack.
引用
收藏
页码:361 / 373
页数:13
相关论文
共 50 条
  • [1] Outlier detection to Secure Wireless Sensor Networks Based on iForest
    Ahmed, Muhammad R.
    Myo, Thirein
    Al Baroomi, Badar
    2022 10TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS), 2022,
  • [2] Hierarchical traceback in wireless sensor networks
    Yang, Feng
    Zhou, Xuehai
    Zhang, Shuguang
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 3840 - 3843
  • [3] Design of sinkhole node detection mechanism for hierarchical wireless sensor networks
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumari, Saru
    Khan, Muhammad Khurram
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4596 - 4614
  • [4] A Randomized Countermeasure Against Parasitic Adversaries in Wireless Sensor Networks
    Papadimitratos, Panagiotis
    Luo, Jun
    Hubaux, Jean-Pierre
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2010, 28 (07) : 1036 - 1045
  • [5] A Secure Clustering Protocol With Fuzzy Trust Evaluation and Outlier Detection for Industrial Wireless Sensor Networks
    Yang, Liu
    Lu, Yinzhi
    Yang, Simon X.
    Guo, Tan
    Liang, Zhifang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (07) : 4837 - 4847
  • [6] User Authentication for Hierarchical Wireless Sensor Networks
    Park, Minsu
    Kim, Hyunsung
    Lee, Sung-Woon
    2013 14TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD 2013), 2013, : 203 - 208
  • [7] An unsupervised and hierarchical intrusion detection system for software-defined wireless sensor networks
    Arkan, AhmadShahab
    Ahmadi, Mahmood
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (11) : 11844 - 11870
  • [9] A Hierarchical Shared Key Algorithm in Wireless Sensor Networks
    Sun, Zeyu
    Wu, Weiguo
    Xing, Xiaofei
    Li, Chuanfeng
    Nie, Yalin
    Cao, Yangjie
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 405 - 412
  • [10] A hierarchical key management method for wireless sensor networks
    Rezaeipour, Kokab Havashemi
    Barati, Hamid
    MICROPROCESSORS AND MICROSYSTEMS, 2022, 90